default search action
BigDataSecurity/HPSC/IDS 2020, Baltimore, MD, USA
- 6th IEEE International Conference on Big Data Security on Cloud, IEEE International Conference on High Performance and Smart Computing, and IEEE International Conference on Intelligent Data and Security, BigDataSecurity/HPSC/IDS 2020, Baltimore, MD, USA, May 25-27, 2020. IEEE 2020, ISBN 978-1-7281-6873-9
- Adithya Bandi, Karuna P. Joshi, Varish Mulwad:
Affinity Propagation Initialisation Based Proximity Clustering For Labeling in Natural Language Based Big Data Systems. 1-7 - Bhavani Thuraisingham:
Multi-Generational Database Inference Controllers. 8-12 - Yundan Liang, Zhengdong Ren, Jiawei Liao, Peipei Jin, Yu Huang, Guangxian Lv, Yiming Lu:
Research on Maintenance Strategy of Distribution Network based on Monte Carlo Tree. 13-18 - Dongxiao Jiang, Chenggang Li, Lixin Ma, Xiaoyu Ji, Yanjiao Chen, Bo Li:
ABInfer: A Novel Field Boundaries inference Approach for Protocol Reverse Engineering. 19-23 - Qian Wang, Jinan Sun, Chen Wang, Shikun Zhang, Sisi Xuanyuan, Bin Zheng:
Access Control Vulnerabilities Detection for Web Application Components. 24-28 - Sai Sree Laya Chukkapalli, Aritran Piplai, Sudip Mittal, Maanak Gupta, Anupam Joshi:
A Smart-Farming Ontology for Attribute Based Access Control. 29-34 - Sofia Dutta, Sai Sree Laya Chukkapalli, Madhura Sulgekar, Swathi Krithivasan, Prajit Kumar Das, Anupam Joshi:
Context Sensitive Access Control in Smart Home Environments. 35-41 - Weipeng Cao, Pengfei Yang, Zhong Ming, Shubin Cai, Jiyong Zhang:
An Improved Fuzziness based Random Vector Functional Link Network for Liver Disease Detection. 42-48 - Aritran Piplai, Sai Sree Laya Chukkapalli, Anupam Joshi:
NAttack! Adversarial Attacks to bypass a GAN based classifier trained to detect Network intrusion. 49-54 - Aidong Xu, Lin Chen, Xiaoyun Kuang, Huahui Lv, Hang Yang, Yixin Jiang, Bo Li:
A Hybrid Deep Learning Model for Malicious Behavior Detection. 55-59 - Lin Chen, Aidong Xu, Xiaoyun Kuang, Huahui Lv, Hang Yang, Yiwei Yang, Bo Li:
Detecting Advanced Attacks Based On Linux Logs. 60-64 - Prasanthi Sreekumari:
Malware Detection Techniques Based on Deep Learning. 65-70 - Wenxuan Pan, Meikang Qiu:
Application of Blockchain in Asset-Backed Securitization. 71-76 - Yihang Wei:
Blockchain-based Data Traceability Platform Architecture for Supply Chain Management. 77-85 - Abhishek Mahindrakar, Karuna Pande Joshi:
Automating GDPR Compliance using Policy Integrated Blockchain. 86-93 - Meikang Qiu, Han Qiu:
Review on Image Processing Based Adversarial Example Defenses in Computer Vision. 94-99 - Zhuoyi Wang, Yigong Wang, Bo Dong, Pracheta Sahoo, Kevin W. Hamlen, Latifur Khan:
Adaptive Margin Based Deep Adversarial Metric Learning. 100-108 - Yongzhi Wang, Chengli Xing, Jinan Sun, Shikun Zhang, Sisi Xuanyuan, Long Zhang:
Solving the Dependency Conflict of Java Components: A Comparative Empirical Analysis. 109-114 - Jennifer Sleeman, Tim Finin, Milton Halem:
Temporal Understanding of Cybersecurity Threats. 115-121 - Xinxin Liu, Hua Huang, Hao Wu:
Intelligent generation algorithm of ceramic decorative pattern. 122-126 - Ali Azari, Josephine M. Namayanja, Navneet Kaur, Vasundhara Misal, Suraksha Shukla:
Imbalanced Learning in Massive Phishing Datasets. 127-132 - Wenhui Hu, Long Zhang, Xueyang Liu, Yu Huang, Minghui Zhang, Liang Xing:
Research on Automatic Generation and Analysis Technology of Network Attack Graph. 133-139 - Aidong Xu, Lin Chen, Yixin Jiang, Huahui Lv, Hang Yang, Bo Li:
Finding Gold in the Sand: Identifying Anomaly Indicators Though Huge Amount Security Logs. 140-144 - Dharitri Tripathy, Rudrarajsinh Gohil, Talal Halabi:
Detecting SQL Injection Attacks in Cloud SaaS using Machine Learning. 145-150 - Vrushang Patel, Seungho Choe, Talal Halabi:
Predicting Future Malware Attacks on Cloud Systems using Machine Learning. 151-156 - Jian Li, Hao Jiang, Wei Jiang, Jing Wu, Wen Du:
SDN-based Stateful Firewall for Cloud. 157-161 - J. Kok Konjaang, Lina Xu:
Cost Optimised Heuristic Algorithm (COHA) for Scientific Workflow Scheduling in IaaS Cloud Environment. 162-168 - Zahir Alsulaimawi:
Gaussian Privacy Protector for Online Data Communication in a Public World. 169-173 - Yunqing Hong, Si Xu:
A Navigation Satellite Selection Method Based on optimized DPSO Algorithm. 174-179 - Xueying Yang, Zhonghua Lu, Meikang Qiu, Yonghong Hu:
A Parallel Integer Relative Robust Mean-RCVaR Model for Portfolio optimization. 180-185 - Disheng Pan, Xizi Zheng, Weijie Liu, Mengya Li, Meng Ma, Ying Zhou, Li Yang, Ping Wang:
Multi-label Classification for Clinical Text with Feature-level Attention. 186-191 - Sathish A. P. Kumar, Michael A. Brown:
A Reflective Neural Network Based Learning Framework for Intelligent Physical Systems. 192-197 - Deepti Gupta, Smriti Bhatt, Maanak Gupta, Olumide Kayode, Ali Saman Tosun:
Access Control Model for Google Cloud IoT. 198-208 - Timilehin David Sobola, Pavol Zavarsky, Sergey Butakov:
Experimental Study of ModSecurity Web Application Firewalls. 209-213 - Muhammad Ali Fauzi, Bian Yang, Edlira Martiri:
PassGAN Based Honeywords System for Machine-Generated Passwords Database. 214-220 - Ronald Doku, Danda B. Rawat:
IFLBC: On the Edge Intelligence Using Federated Learning Blockchain Network. 221-226 - Sushant Sharma, Pavol Zavarsky, Sergey Butakov:
Machine Learning based Intrusion Detection System for Web-Based Attacks. 227-230 - Victor Ajiri, Sergey Butakov, Pavol Zavarsky:
Detection Efficiency of Static Analyzers against Obfuscated Android Malware. 231-234 - Krishna Gondaliya, Sergey Butakov, Pavol Zavarsky:
SLA as a mechanism to manage risks related to chatbot services. 235-240 - Osborn N. Nyasore, Pavol Zavarsky, Bobby Swar, Raphael Naiyeju, Shubham Dabra:
Deep Packet Inspection in Industrial Automation Control System to Mitigate Attacks Exploiting Modbus/TCP Vulnerabilities. 241-245 - Sayeed Salam, Lamisah Khan, Amir El-Ghamry, Patrick T. Brandt, Jennifer S. Holmes, Vito D'Orazio, Javier Osorio:
Automatic Event Coding Framework for Spanish Political News Articles. 246-253 - Ou Ruan, Xiongbo Huang, Hao Mao:
An Efficient Private Set Intersection Protocol for the Cloud Computing Environments. 254-259 - Andrii Kashliev:
Storage and Querying of Large Provenance Graphs Using NoSQL DSE. 260-262 - Julie L. Harvey, Sathish A. P. Kumar:
A Survey of Intelligent Transportation Systems Security: Challenges and Solutions. 263-268
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.